A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum, Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), 2006.
DOI : 10.1109/SP.2006.32

URL : http://theory.stanford.edu/people/jcm/papers/barth-datta-mitchell-nissenbaum-2006.pdf

A. Barth, A. Datta, J. C. Mitchell, and S. Sundaram, Privacy and Utility in Business Processes, 20th IEEE Computer Security Foundations Symposium (CSF'07), 2007.
DOI : 10.1109/CSF.2007.26

Y. Moritz, A. Becker, L. Malkis, and . Bussard, S4P: A Generic Language for Specifying Privacy Preferences and Policies, 2010.

A. Cau and H. Zedan, Refining interval temporal logic specifications, Transformation-Based Reactive Systems Development, 1997.
DOI : 10.1016/0304-3975(94)90096-5

URL : http://www.cse.dmu.ac.uk/~cau/papers/itlextension.ps.gz

D. Vijay, D. Silva, G. Kroening, and . Weissenbacher, A Survey of Automated Techniques for Formal Software Verification, In IEEE Trans. on CAD of Integrated Circuits and Systems, 2008.

W. L. Philip, M. Fong, Z. Anwar, and . Zhao, A Privacy Preservation Model for Facebook-Style Social Network Systems, ESORICS, 2009.

J. Hoepman, Privacy Design Strategies, ICT Systems Security and Privacy Protection, 2014.
DOI : 10.1007/978-3-642-55415-5_38

URL : https://hal.archives-ouvertes.fr/hal-01370395

C. Lazaro and D. L. Métayer, Control over Personal Data: True Remedy or Fairy Tale? SCRIPTed, 2015.
DOI : 10.2966/scrip.120115.3

A. Lazouski, F. Martinelli, and P. Mori, Usage control in computer security: A survey, Computer Science Review, vol.4, issue.2, p.2010
DOI : 10.1016/j.cosrev.2010.02.002

D. Le and M. , A formal privacy management framework, Formal Aspects in Security and Trust, 2008.

M. Mondal, P. Druschel, K. P. Gummadi, and A. Mislove, Beyond Access Control: Managing Online Privacy via Exposure, Proceedings 2014 Workshop on Usable Security, 2014.
DOI : 10.14722/usec.2014.23046

URL : http://www.mpi-sws.org/~druschel/publications/usec2014-exposure.pdf

R. Pardo and G. Schneider, A Formal Privacy Policy Framework for Social Networks, 12th International Conference on Software Engineering and Formal Methods (SEFM), 2014.
DOI : 10.1007/978-3-319-10431-7_30

J. Park and R. Sandhu, The U CON ABC Usage Control Model, ACM Transactions on Information and System Security, 2004.

J. Park and R. Sandhu, A Position Paper: A Usage Control (UCON) Model for Social Networks Privacy, 2010.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, 2008.
DOI : 10.1145/359168.359176

. Wikipedia, The Right to Privacy. Accessed on, pp.2015-2026

X. Zhang, F. Parisi-presicce, R. Sandhu, and J. Park, Formal model and policy specification of usage control, ACM Transactions on Information and System Security, vol.8, issue.4, 2005.
DOI : 10.1145/1108906.1108908

URL : http://www.list.gmu.edu/journals/tissec/p351-zhang.pdf